نتایج جستجو برای: cat map
تعداد نتایج: 229005 فیلتر نتایج به سال:
The representation of the visual field in the second and third visual cortical areas (V n and V h i) of the cat was examined by microelectrode recording. The position of the field maps and the arrangement of the map within V n were found to vary greatly from one cat to another so that no single composite map can be made. The horizontal meridian of the visual field was found to run laterally and...
Let Cat be the category whose objects are small categories (categories whose collection of objects are sets) and whose morphisms Cat(C,D) from category C to category D are functors F : C → D. Let Set be the category whose objects are sets and given x, y ∈ Ob(Set) morphisms in Set from x to y are maps f : x → y. We define an equivalence relation IsoC on Ob(C) as follows: two objects x and y are ...
With the rapid evolution of Internet technology, fog computing has taken a major role in managing large amounts data. The concerns this domain are security and privacy. Therefore, attaining reliable level confidentiality environment is pivotal task. Among different types data stored fog, 3D point mesh increasingly popular recent days, due to growth modelling printing technologies. Hence, resear...
Penelitian ini dikembangkan dengan tujuan meningkatkan metode enkripsi citra digital berbasis Arnold Cat Map termodifikasi difusi DNA encoding. Fokus penelitian menganalisis performansi pengacakan yang didifusikan Hasil diuji 4 parameter numerik, yaitu entropi, Mean-squared error (MSE), peak signal-tonoise ratio (PSNR) dan koefisien korelasi. Citra pengujian dikhususkan pada persegi variasi uku...
The cancellable biometric transformations are designed to be computationally difficult obtain the original data. This paper presents a multi-biometric identification scheme that includes four stages: data collection and processing, Arnold's Cat Map encryption, decimation process reduce size, final merging of biometrics in single generated template. First, 2D matrix size 128 × is created based o...
The security is an essential part of any communication system. Presently there are many types of encryption methods are available in symmetric and asymmetric key schemes because of long time requirement asymmetric schemes are not preferred for the large data encryption. Symmetric scheme is much better when compared for decoding time, in symmetric key the same key is used for both coding and dec...
THE bony tentorium cerebelli of the cat lies between the cerebellum and the cerebral hemispheres. Since its exact location and size are not indicated in the major atlases [ 1, 2, 3, 4, 5], its discovery often comes as an unpleasant surprise to investigators attempting to explore brain stem or cerebellar areas with depth electrodes or cannulae. A direct hit may destroy both the electrode being p...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید